1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex73 [517]
3 years ago
5

What are the main types of computer software?

Computers and Technology
2 answers:
torisob [31]3 years ago
8 0
Application software and operating system.

The other options are hardware, not software.
Sphinxa [80]3 years ago
6 0

application software, operating system and basic input/output system

You might be interested in
In Java; Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or
gtnhenbr [62]

Answer:

The solution code is written in Java.

  1. import java.util.Scanner;
  2. public class Main {
  3.    public static void main(String[] args) {
  4.        String letters[] = {"A", "B", "C", "D", "E", "F", "G", "H", "I", "J"};
  5.        Scanner scnr = new Scanner(System.in);
  6.        int numRows;
  7.        int numColumns;
  8.        int currentRow;
  9.        int currentColumn;
  10.        numRows = scnr.nextInt();
  11.        numColumns = scnr.nextInt();
  12.        for(currentRow = 0; currentRow < numRows;currentRow++){
  13.            for(currentColumn =0; currentColumn < numColumns; currentColumn++)
  14.            {
  15.                System.out.print((currentRow + 1) + letters[currentColumn] + " ");
  16.            }
  17.        }
  18.    }
  19. }

Explanation:

Firstly, we need to create an array to hold a list of letters (Line 6). In this solution, only letters A - J are given for simplicity.

Next, we declare all the variables that we need, numRows, numColumns, currentRow and currentColumn (Line 8 - 11).

Next, we use Scanner object, scnr to prompt user to input integer for <em>numRows </em>and <em>numColumns </em>(Line 12-13).

At last, we use two-layer for loops to traverse through the number of rows and columns and print out the currentRow and currentColumn (Line 15-19). Please note the currentRow is added by 1 as the currentRow started with 0. To print the letter, we use currentColumn as an index to take out the letter from the array.

4 0
2 years ago
: How does the founder of Wikipedia keep a tight reign on accuracy? HELP PLEZ AT LEAST A PARGRAPH PLES
natita [175]
The truth is that you do not get to just make an account and post. He keeps it steady by having a highly trained group of people go through all the information and make sure it is correct before they let it be posted. They have not, however, changed things that were posted before those people started to work.
5 0
3 years ago
________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
Alina [70]

Answer:

Social engineering is a process of manipulating people into breaking normal security procedures or divulging confidential information.

Explanation:

7 0
2 years ago
Pharming involves redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web brow
Anna35 [415]

Answer:

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.          

Explanation:

  • When a hacker steals your confidential and private information by installing a malicious code on your computer which misdirects you to fake and fraudulent websites, this is called pharming.
  • Hacker installs virus on your computer which manipulates the host files on your computer.
  • The hacker uses DNS cache poisoning to attack DNS services on your computer which makes many users to enter fraudulent site, unknowingly, as they type the URL of the real website.
  • These fraudulent website developed by hacker can install virus on your computer and steal confidential information from your computer.
  • Pharming is done by hackers in order to steal sensitive data from a person's computer.
8 0
2 years ago
All organizations need good quality cybersecurity to ensure _____. Select 4 options.
vova2212 [387]

Answer:

option 1

Explanation:

it is because they need better security for operational

7 0
2 years ago
Read 2 more answers
Other questions:
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • You can use Facebook's Live Feed tool to broadcast content as you post it, true or false?
    11·1 answer
  • In order to plan George's birthday, his father gave him a list of people who attended his birthday for the last five years. What
    5·1 answer
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • How to get the home button on your screen?
    13·1 answer
  • Small data files that are deposited on a user's hard disk when they visit a website are called _______.
    6·2 answers
  • What is computer graphics? define​
    11·1 answer
  • Which printer are used to print text and graphics with high speed ​
    15·1 answer
  • Which picture should i put as my profile picture.
    15·2 answers
  • What is polymerization1​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!